AIM Triad: A Prioritization Strategy for Public Institutions to Improve Information Security Maturity

J Hochstetter-Diez, M Diéguez-Rebolledo… - Applied Sciences, 2023 - mdpi.com
In today's world, private and government organizations are legally obligated to prioritize their
information security. They need to provide proof that they are continually improving their …

Using Ontological Methods to Compare Cybersecurity Maturity Model Certification 2.0 and COBIT 19

AM Ramey - 2024 - search.proquest.com
Cybersecurity frameworks developed by a variety of organizations and implemented by a
much larger collection of organizations differ in their focus and application. Whether …

Research on E-Commerce Information Security Risk Assessment Based on Delphi Method and Analytic Hierarchy Process

W Fang - 2023 7th International Conference on E-Business and …, 2023 - dl.acm.org
Under the booming background of e-commerce, the information security risks of e-
commerce are a hot topic of research, so how to assess the information security risks of e …

Research on Network Accounting Information Security based on AES Algorithm

D Hu - 2023 Global Conference on Information Technologies …, 2023 - ieeexplore.ieee.org
The role of information security in network accounting is very important, but there is a
problem of inaccurate outcome evaluation. The one-way hash encryption algorithm cannot …